Home  |  About  |  Contact

Friday, 20 Nov , 2015

A Rash Of #InfoSec #Analogettes

Share this article

A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if they’re of use, go for it (attribution is appreciated 😉 ) To be updated with links to good related advice in the next couple […]

A popular feature here fell by the wayside for a while. To regain momentum here are collected tweet-size analogies (a.k.a Weekly Wee Ones) with a new one created just today. As ever, if they’re of use, go for it (attribution is appreciated 😉 )
To be updated with links to good related advice in the next couple of days.
To kick off, my first two pictorial #analogettes:

A tech-centric InfoSec strategy is like…

Tech-centric InfoSec Strategy

Collecting SIEM / Threat / Vulnerability data without business risk relevant analysis is like…

Drowing in Vulnerability Threat and SIEM data

Breaches are like colds…

Incident response with no plan is like…

Most pentest reports are like…

Where and to whom does the GDPR apply?

Yeah, I doubted my sanity going at this one too, but here I am, because working out whether or not the GDPR would apply in different practical and geographical circumstances is proving harder than it really should...for everyone. This regulation has been my almost...